Social Networking: Roadblocks, Risks, Rewards

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.


Facebook and Twitter usage in the workplace is going through the roof, causing major security headaches at all levels,
both inside and outside the boardroom.

The security issues that Web 2.0 services create are far from simple - managers need to understand not just the IT risks of data leakage, malware propagation, but also the compliance and legislative requirements.

On top of this, managers also need to control what each department - and member of staff - does online, creating a growing logistical and technological headache for most organisations.

How do you, for example, allow call center staff to interact with customers via Twitter - a perfectly good business scenario - and yet stop the office staff from playing Farmville on Facebook instead of working?

It's all about being able to control, at a granular level, what each member of staff and/or their departments can and cannot do.

 

Join us for an educational and informative webinar in which we will:


* Explain the social computing security and compliance problems that you now face.

* Help you understand the regulatory issues involved with Web 2.0 services.

* Detail the solutions to those problems.

* Look at how granular control of social networking services functions.


This webinar is for:


* IT professionals wanting to understand the security and compliance issues that social networking sites create - and how to solve those issues.

* Any management professional wanting a 60-minute rundown on the social networking security and compliance challenges that lie ahead.

* Business and IT managers seeking to leverage use of social computing to improve internal and external collaboration.

* Professionals seeking to understand how to leverage social computing in a manner consistent with compliance requirements.
 

 

CISSP SSCP logo

CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

 

 

Speakers

Sarah Carter

Vice President of Marketing, FaceTime Communicatio

Steve Gold

Infosecurity Magazine

Ted Ritter

Senior Research Analyst, Nemertes Research

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.